Cybersecurity

As you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players….

Read More

Researchers at a Belgian University earlier this week revealed the discovery of a break in the security protocol used to protect the vast majority of Wi-Fi connections (WPA2 based).  Mathy Vanhoef of imec-DistriNet, KU Leuven University, released his findings explaining that an attacker within range of a victim can exploit these weaknesses using…

Read More

MasterCard is done with antiquated signatures.Image: MIKE CLARKE/AFP/Getty Images By Sasha Lekach2017-10-21 00:42:55 UTC “Can I get you to sign on the bottom?” “Your signature, please?” “Sign here.” Those prompts that you’ve heard forever after shopping, eating out, and spending money are coming to an end. MasterCard is doing away…

Read More

It feels like barely a week goes by without another breaking news account of a terrorist attack involving vehicle ramming, a form of attack in which a perpetrator deliberately aims a motor vehicle at a target with the intent to inflict fatal injuries or significant property damage by striking with…

Read More

Few people would argue that cybersecurity is in a parlous state. In the last few weeks, we’ve seen a connected car wash and fish tank hacked respectively and a smart gun unlocked and fired thanks to a magnet at the latest DefCon. In response to the problem, a bipartisan group…

Read More

Ten years ago you didn’t have to worry about someone hacking your refrigerator. Today, your personal home assistant is quite literally listening to your every move. Experts believe that in just a few years, there will be over 20 billion devices connected to the internet with the possibility of being…

Read More

There’s no question that the Internet of Things is the new security battleground. Internet-connected webcams, HVAC systems, cars, TVs, watches, printers and more are giving people more use out of their devices. But these devices also open doors to hackers who want to steal corporate data, lasso thousands of devices into botnets…

Read More

Last month, public reports from ESET and Dragos outlined a new, highly capable Industrial Controls Systems (ICS) attack platform — the one reportedly used in 2016 against critical utilities infrastructure in Ukraine. CRASHOVERRIDE (alternately named Industroyer), the malware framework used on a cyberattack on the Ukraine electric grid in 2016, hit an…

Read More

217 Shares Human rights activist Ahmed Mansoor shows Associated Press journalists a screenshot of a spoof text message he received in Ajman, United Arab Emirates.Image: Jon Gambrell/AP/REX/Shutterstock By Colin Daileda2017-06-19 23:15:56 UTC Mexican journalist and human rights lawyers have been getting some troubling texts.  Some come in the guise of…

Read More